CVE-2018-0117 (CNNVD-201802-278)

HIGH
中文标题:
Cisco Virtualized Packet Core-Distributed Instance Software Cisco StarOS操作系统安全漏洞
英文标题:
A vulnerability in the ingress packet processing functionality of the Cisco Virtualized Packet Core-...
CVSS分数: 8.6
发布时间: 2018-02-08 07:00:00
漏洞类型: 输入验证错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco Virtualized Packet Core-Distributed Instance(VPC-DI)Software是美国思科(Cisco)公司的一套被部署在专用硬件平台的StarOS软件的产品化版本。Cisco StarOS operating system是其中的一套虚拟化操作系统。 Cisco VPC-DI Software N4.0版本至N5.5版本中的Cisco StarOS操作系统19.2版本至21.3版本的ingress packet处理功能存在拒绝服务漏洞,该漏洞源于程序没有充分的处理用户提交的数据。远程攻击者可通过发送恶意的流量利用该漏洞造成拒绝服务(VPC重新加载和订阅用户连接中断)。

英文描述:

A vulnerability in the ingress packet processing functionality of the Cisco Virtualized Packet Core-Distributed Instance (VPC-DI) Software could allow an unauthenticated, remote attacker to cause both control function (CF) instances on an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient handling of user-supplied data by the affected software. An attacker could exploit this vulnerability by sending malicious traffic to the internal distributed instance (DI) network address on an affected system. A successful exploit could allow the attacker to cause an unhandled error condition on the affected system, which would cause the CF instances to reload and consequently cause the entire VPC to reload, resulting in the disconnection of all subscribers and a DoS condition on the affected system. This vulnerability affects Cisco Virtualized Packet Core-Distributed Instance (VPC-DI) Software N4.0 through N5.5 with the Cisco StarOS operating system 19.2 through 21.3. Cisco Bug IDs: CSCve17656.

CWE类型:
CWE-20
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
cisco asr_5000_firmware 21.1.v0.66836 - - cpe:2.3:o:cisco:asr_5000_firmware:21.1.v0.66836:*:*:*:*:*:*:*
cisco asr_5000_firmware 21.1.v7 - - cpe:2.3:o:cisco:asr_5000_firmware:21.1.v7:*:*:*:*:*:*:*
cisco asr_5000_firmware 21.3.0 - - cpe:2.3:o:cisco:asr_5000_firmware:21.3.0:*:*:*:*:*:*:*
cisco asr_5000_firmware 21.6.0 - - cpe:2.3:o:cisco:asr_5000_firmware:21.6.0:*:*:*:*:*:*:*
cisco asr_5500_firmware 21.1.v0.66836 - - cpe:2.3:o:cisco:asr_5500_firmware:21.1.v0.66836:*:*:*:*:*:*:*
cisco asr_5500_firmware 21.1.v7 - - cpe:2.3:o:cisco:asr_5500_firmware:21.1.v7:*:*:*:*:*:*:*
cisco asr_5500_firmware 21.3.0 - - cpe:2.3:o:cisco:asr_5500_firmware:21.3.0:*:*:*:*:*:*:*
cisco asr_5500_firmware 21.6.0 - - cpe:2.3:o:cisco:asr_5500_firmware:21.6.0:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
102970 vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
CVSS评分详情
8.6
HIGH
CVSS向量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CVSS版本: 3.0
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2018-02-08 07:00:00
修改时间:
2024-12-02 21:23:58
创建时间:
2025-11-11 15:34:56
更新时间:
2025-11-11 15:53:34
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2018-0117 2025-11-11 15:19:35 2025-11-11 07:34:56
NVD nvd_CVE-2018-0117 2025-11-11 14:55:52 2025-11-11 07:43:33
CNNVD cnnvd_CNNVD-201802-278 2025-11-11 15:09:58 2025-11-11 07:53:34
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:53:34
vulnerability_type: 未提取 → 输入验证错误; cnnvd_id: 未提取 → CNNVD-201802-278; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 输入验证错误
  • cnnvd_id: 未提取 -> CNNVD-201802-278
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:43:33
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 8.6; cvss_vector: NOT_EXTRACTED → CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H; cvss_version: NOT_EXTRACTED → 3.0; affected_products_count: 0 → 8; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 8.6
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  • cvss_version: NOT_EXTRACTED -> 3.0
  • affected_products_count: 0 -> 8
  • data_sources: ['cve'] -> ['cve', 'nvd']